Access "Security as a Service: Benefits and risks of cloud-based security"
Those of us who make our living from information security carry with us a dark secret: We are fighting a losing battle and giving up ground in the form of data breaches at an alarming rate. This is not due to the lack of effort on our part in protecting our organization’s assets. It comes down to the simple fact that the attackers have more time and tools for offense than we have for defense. Some organizations simply can’t afford to invest the resources necessary into a proper information security program, while others build half-hearted infosecurity programs with minimal staffing and budgets just to meet regulatory compliance. So the fact that we are losing the battle is not really a secret to anyone. However, times are changing and security professionals have a new weapon available for their arsenal to combat the ever-increasing risk of cyberattacks. The cloud has been quickly adopted by enterprises in order to reduce costs, increase agility and provide business expertise. These same types of advantages also apply to using cloud-based security services... Access >>>
Premium Content for Free.
A new framework for preventing XSS attacks
by Joseph Bugeja and Geraint Price
Understand how cross-site scripting attacks work and how to prevent them.
Security as a Service: Benefits and risks of cloud-based security
by Joseph Granneman
Know the pros and cons to cloud-based security services before making the leap.
- A new framework for preventing XSS attacks by Joseph Bugeja and Geraint Price
Malware analysis tools and techniques failing but researchers aim for improvement
by Robert Westervelt
Malware analysis is falling short but some security researchers are working to reverse the trend.
Mobile application security best practices in a BYOD world
by Russ McRee, Contributor
Mobile applications are proliferating in the enterprise, posing new risks to enterprises and requiring mitigation.
- Malware analysis tools and techniques failing but researchers aim for improvement by Robert Westervelt
Marcus Ranum chat: The information security metrics dilemma
by Marcus J. Ranum, Contributor
Security expert Marcus Ranum goes one-on-one with Alex Hutton about the problems with security metric efforts.
Reflections on changing information security trends
by Michael S. Mimoso, Editorial Director
Veteran security journalist reminisces about covering the industry and says farewell to TechTarget.
BYOD policy: The costs and potential ROI
by Andrew Braunberg, Contributor
Security pros need to understand the total costs and potential ROI of BYOD policies.
- Marcus Ranum chat: The information security metrics dilemma by Marcus J. Ranum, Contributor
More Premium Content Accessible For Free
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...
The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...